CN112989371A - Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging - Google Patents
Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging Download PDFInfo
- Publication number
- CN112989371A CN112989371A CN202110230376.1A CN202110230376A CN112989371A CN 112989371 A CN112989371 A CN 112989371A CN 202110230376 A CN202110230376 A CN 202110230376A CN 112989371 A CN112989371 A CN 112989371A
- Authority
- CN
- China
- Prior art keywords
- image
- decryption
- matrix
- transform
- walsh
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a multi-image encryption and decryption method based on Walsh transform and computational ghost imaging, which comprises the following steps: Walsh-Hadamard compression transformation is carried out on a plurality of plaintext images, Arnold scrambling transformation is carried out on a plurality of effective pixels, then the used object plane light intensity is loaded into a ghost imaging calculation light path in sequence, and a target image is encrypted into a ciphertext sequence; secondly, decryption: in the decryption process, the corresponding plaintext image is successfully decrypted by measuring key recovery, compression algorithm reconstruction, inverse Arnold transform and inverse Walsh-Hadamard transform with a correct key set. The image encryption method provided by the invention has the advantages of simple encryption operation, high decryption efficiency and high safety.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a multi-image encryption and decryption method based on Walsh transform and computational ghost imaging.
Background
In recent years, the development of information technology brings great convenience to people, but at the same time, information security also brings serious challenges to people. Some optical methods for information security, such as optical image encryption, image hiding, and authentication, are receiving increasing attention. Among them, the optical dual-random phase encoding technology based on the 4f system is widely applied. However, the dual random phase encoding technique needs to record the amplitude and phase of information during encryption, and both the encryption efficiency and the decryption efficiency are not high.
Ghost imaging is a new imaging technique based on the correlation between separate but related light fields. Conventional ghost imaging typically uses a large number of random speckle images for illumination and image reconstruction, with the imaging quality typically being proportional to the number of random speckles. Ghost imaging has been used for image encryption due to its physical advantages, using a bucket detector without spatial resolution to record a series of ciphertext sequences. In 2010, clement and Dur-n encrypted the image information into the bucket detector using a computational ghost imaging algorithm and decryption was done using a classical ghost imaging correlation algorithm.
At present, most encryption methods based on ghost imaging adopt a large number of random phases as keys to encrypt images, and adopt an optical means during decryption. Because these methods need to store and transmit a large amount of random phases, the number of measurements and data are very large, and thus the practical application of these methods is still limited.
Disclosure of Invention
The invention aims to provide a multi-image encryption and decryption method based on Walsh transform and computational ghost imaging. The invention can effectively encrypt multiple images and has the advantages of simple encryption operation, high decryption efficiency and high safety.
In order to solve the technical problems, the technical scheme provided by the invention is as follows: a multi-image encryption and decryption method based on Walsh transform and computational ghost imaging is characterized in that: comprises the following steps of encryption:
s1, performing Walsh-Hadamard transform on the multiple images to obtain compressed sparse images, extracting partial pixels in energy sets in all the sparse images to form pixel sets, and recombining the pixel sets according to a zigzag index sequence to obtain a recombined image;
s2, performing sign taking operation on the reconstructed image to obtain a sign matrix containing each pixel, performing constant decomposition on the sign matrix to obtain a group of amplitude plate pairs, and performing Fresnel diffraction on the amplitude plate pairs to generate object plane light intensity;
s3, carrying out absolute value taking operation on the reconstructed image to obtain a matrix containing the absolute value of each pixel, and carrying out Arnold scrambling transformation on the absolute value matrix once to obtain a target image;
s4, taking the target image as an input image of the ghost imaging system, projecting the target image by utilizing the light intensity of the object plane to obtain intensity pairs, calculating the difference value between the intensity pairs to obtain an intensity value, combining all the intensity values to form a ciphertext sequence, and finishing encryption;
and (3) decryption:
rearranging the light intensity of the object plane into corresponding row vector pairs, calculating the difference value between the row vector pairs to obtain row vectors, sequentially arranging the row vectors from top to bottom according to the sequence numbers to form a measurement matrix, executing a compressed sensing reconstruction algorithm with the ciphertext sequence to recover the target image, and finally restoring the image according to the zigzag pixel index sequence by using inverse Arnold transformation to finish decryption.
In the above-mentioned multi-image encryption and decryption method based on walsh transform and computational ghost imaging, the formula obtained for the pair of amplitude plates in step S2 is as follows:
in the formula: pW +And PW -Two amplitude plate pairs consisting of 0 and 1 respectively;IWHT[]representing inverse Walsh-Hadamard transforms, (m, n), (x)0,y0) Respectively representing spatial coordinates, delta, before and after the inverse Walsh-Hadamard transformW(m, n) is a two-dimensional impulse function,
the above-mentioned multi-image encryption and decryption method based on Walsh transform and computational ghost imaging, generation of the object plane light intensityThe process is as follows: irradiating the amplitude plates P with parallel light of wavelength lambdaWi +,PWi -A distance z in the propagation direction1The diffracted light field at (A) is represented as the primary wavelength of the amplitude plate at λ and the distance at z1The recorded diffraction light intensity is the object plane light intensity:
wherein FrT [ alpha ]]Representing the Fresnel transformation, (x, y) representing the coordinates of the Fresnel diffraction output plane, | luminance2Indicating the operation of recording the diffracted intensity.
In the multi-image encryption and decryption method based on walsh transform and computational ghost imaging, the process of obtaining the target image by performing Arnold scrambling transform on the absolute value matrix is as follows:
where a, b and N are positive integers, a, b and the number of Arnold transformations as decryption keys, N represents the width of the new matrix, mod () is a modulo operation, (x)n,yn) Is the pixel coordinate of the new matrix, (x'n,y′n) Is (x)n,yn) The coordinates of the object after the transformation are obtained,is an invertible matrix.
In the aforementioned multi-image encryption and decryption method based on walsh transform and computational ghost imaging, in step S4, intensity pairs D are measured and recorded using a barrel detectorWi +And DWi -I.e. by
DWi +=SUM[IWi +(x,y)T(x,y)]
DWi -=SUM[IWi -(x,y)T(x,y)];
Wherein SUM () represents a SUM operation on all elements of the matrix; t (x, y) is the target image, and (x, y) represents the coordinates of the Fresnel diffraction output plane;
calculating DWi +、DWi -The difference between them is used to obtain an intensity value DWiNamely:
DWi=DWi +-DWi -
DWito compute the ith ciphertext of the ghost image, all the ciphertexts are combined to form a ciphertext sequence.
In the aforementioned multi-image encryption and decryption method based on walsh transform and computational ghost imaging, the process of recovering the target image in the decryption step is as follows:
where T represents the target image T (x, y),l represents1Norm, argmin (·) represents the minimum value that satisfies the condition.
In the aforementioned multi-image encryption and decryption method based on walsh transform and computational ghost imaging, the decryption step uses the inverse Arnold transform as follows:
whereinIs thatCorresponding inverse matrices, a, b and N are positive integers, a, b and the number of Arnold transformations as decryption keys, N represents the width of the new matrix, mod () is a modulo operation, (x'n,y′n) Is (x)n,yn) Transformed coordinates, (x)n,yn) Is the pixel coordinates of the new matrix.
Compared with the prior art, the method combines the image Walsh-Hadamard compression transform and the principle of calculating ghost imaging coding, and encrypts and generates an intensity sequence as a ciphertext sequence, so that a large number of keys do not need to be transmitted, and the problem of key template information leakage existing in most image encryption methods is solved; the encryption process and the decryption process respectively adopt the ghost image calculation coding and decoding modes, so that optical holographic recording of phases is not needed, the process is simpler, and simultaneously Arnold transformation is introduced in the operation process and combined with a ciphertext sequence, so that the safety of the system is improved. The invention can effectively encrypt multiple images and has the advantages of simple encryption operation, high decryption efficiency and high safety. In addition, the invention uses the total variation regularization compressed sensing recovery algorithm, so that the iterative convergence speed is higher, and the quality of the reconstructed image is higher.
Drawings
Fig. 1 is a flow chart of an encryption process.
Fig. 2 is a flowchart of the decryption process.
FIGS. 3(a) - (d) are a plurality of plaintext images; (e) an encrypted amplitude plate key; (f) one of the symbol keys obtained by constant decomposition; (g) a pixel mosaic; (h) and (4) obtaining a graph to be encrypted after Arnold transformation.
FIG. 4 computes a ghost image decoding map and a final decryption map. (a) Compressing a ghost imaging decoding image; (b) inverse Arnold transform of the resulting profile; (c) - (f) correct indexing of the keys to obtain the final decrypted graph.
FIG. 5 is a graph of an analysis. (a) Adding white Gaussian noise with different degrees into the ciphertext image, and obtaining a relation graph between Correlation Coefficients (CC) between the four plaintext images and the decrypted image and the noise intensity; (b) and a relation graph between the correlation coefficient between the original image Lena and the image obtained by final decryption and the corresponding ciphertext quantity.
FIG. 6 is a "Lena" decrypted image obtained when the decryption key is erroneous; (a) a decrypted image obtained when the wrong measurement matrix is decrypted; (b) a decrypted image obtained when the wrong Arnold transformation key is decrypted; (c) and a decrypted image obtained when the wrong symbol key is decrypted.
Detailed Description
The present invention will be further described with reference to the following examples and drawings, but the present invention is not limited thereto.
Example (b): a multi-image encryption and decryption method based on walsh transforms and computational ghost imaging, comprising the encryption steps as shown in fig. 1:
s1, for multiple images fi(i 1,2,3 … N) (Target images in fig. 1) to perform walsh-hadamard transform to obtain compressed sparse image gi(Compress imges in FIG. 1), i.e. gi(x0,y0)=WHT[fi(m,n)]Wherein WHT [ alpha ], [ alpha ]]Representing Walsh-Hadamard transform, all sparse images g are extractediForming a pixel set Pix (x, y) by the pixels in the middle energy set, and recombining the pixel set according to the index sequence of the zigzag to obtain a recombined image B (x, y) (the reconstructed image in FIG. 1); i.e. B (x, y) ═ RA { Pix (x, y) }, where RA { } represents the glyph extraction operation, i.e. the pixels in the sequence of extraction matrices are extracted according to a glyph scan;
s2, obtaining a symbol matrix sign { B (x, y) } containing each pixel of the recombined image B (x, y) after carrying out symbol taking operation on the recombined image B (x, y), wherein sign { } is a symbol taking operator, the symbol matrix consists of +/-1 only, and then carrying out constant decomposition on the symbol matrix sign { B (x, y) } to obtain a group of amplitude-vibrating plate pairs, wherein the obtained formula of the amplitude-vibrating plate pairs is as follows:
in the formula: pW +And PW -Two amplitude plate pairs consisting of 0 and 1 respectively;IWHT[]representing inverse Walsh-Hadamard transforms, (m, n), (x)0,y0) Respectively representing spatial coordinates, delta, before and after the inverse Walsh-Hadamard transformW(m, n) is a two-dimensional impulse function,
then, the amplitude plate pair is subjected to Fresnel diffraction to generate object plane light intensity:
irradiating the amplitude plates P with parallel light of wavelength lambdaWi +,PWi -A distance z in the propagation direction1The diffracted light field at (A) is represented as the primary wavelength of the amplitude plate at λ and the distance at z1The recorded diffraction light intensity is the object plane light intensity:
wherein FrT [ alpha ]]Representing the Fresnel transformation, (x, y) representing the coordinates of the Fresnel diffraction output plane, | luminance2Indicating the operation of recording the diffracted intensity.
S3, performing an absolute value operation on the reconstructed image B (x, y) to obtain a matrix abs { B (x, y) } containing the absolute value of each pixel, and performing an Arnold scrambling transform on the absolute value matrix abs { B (x, y) } to obtain a target image T (x, y) (AST image in fig. 1), where the process is shown as follows:
where a, b and N are positive integers, a, b and the number of Arnold transformations as decryption keys, N represents the width of the new matrix, mod () is a modulo operation, (x)n,yn) Is a new momentPixel coordinates of matrix, (x'n,y′n) Is (x)n,yn) The coordinates of the object after the transformation are obtained,is an invertible matrix.
S4, using the object plane light intensity I and using the target image T (x, y) as the input image of the ghost imaging systemWi +(x, y) and IWi -(x, y) projecting the target image separately, measuring and recording the intensity pair D with a barrel detectorWi +And DWi -I.e. by
DWi +=SUM[IWi +(x,y)T(x,y)]
DWi -=SUM[IWi -(x,y)T(x,y)];
Wherein SUM () represents a SUM operation on all elements of the matrix; t (x, y) is the target image, and (x, y) represents the coordinates of the Fresnel diffraction output plane;
calculating DWi +、DWi -The difference between them is used to obtain an intensity value DWiNamely: dWi=DWi +-DWi -
DWiIn order to calculate the ith Ciphertext of the ghost image, all the ciphertexts are combined to form a Ciphertext sequence (Ciphertext in figure 1) to finish encryption;
and (3) decryption:
as shown in FIG. 2, the object plane is illuminated by a light intensity IWi +(x, y) and IWi -(x, y) are rearranged into corresponding pairs of row vectors IWi +(x) And IWi -(x) Calculating the difference between the row vector pair to obtain a row vector IWi(x) I.e. that
IWi(x)=IWi +(x)-IWi -(x)
The row vectors are sequentially arranged from top to bottom according to the sequence number i to form a measurement matrix phi, and a compressed sensing reconstruction algorithm is executed with the ciphertext sequence to recover a target image, wherein the process is as follows:
where T represents the target image T (x, y),l represents1Norm, argmin (·) represents the minimum value that satisfies the condition.
And finally, restoring the image by using inverse Arnold transformation according to the return-font pixel index sequence, wherein the process is as follows:
whereinIs thatCorresponding inverse matrices, a, b and N are positive integers, a, b and the number of Arnold transformations as decryption keys, N represents the width of the new matrix, mod () is a modulo operation, (x'n,y′n) Is (x)n,yn) Transformed coordinates, (x)n,yn) Is the pixel coordinates of the new matrix.
And finally, the decryption is completed.
The invention is further explained below with reference to specific examples.
First, as shown in fig. 3, four gray-scale maps "monke y" (fig. 3 (a)), "barbarbara" (fig. 3 (b)), "Boat" (fig. 3 (c)), "Lena" (fig. 3 (d)) having a size of 128 × 128 are selected as plaintext images, and an amplitude slab for encryption, which is a matrix composed of only 0,1 and having a size of 128 × 128, is shown in fig. 3(e) and 3 (f). The pixel reconstructed image after the walsh-hadamard compression transform and the image to be encrypted obtained after the Arnold transform are respectively shown in fig. 3(g) and fig. 3 (h).
And obtaining a target image T (x, y) through an encryption process shown in fig. 1, and finally converting the target image T (x, y) into a ciphertext sequence by using a computational ghost imaging technology.
The decryption process is as shown in fig. 2, a reconstructed image is obtained according to the compressed ghost imaging technology, and then a plurality of correct decryption images can be obtained by utilizing inverse Arnold transformation and a correct index sequence.
Fig. 4 shows the calculation of the ghost image reconstruction map and the final decrypted image, wherein fig. 4(a) is the compressed ghost image reconstruction map, fig. 4(b) is the image decrypted by the inverse Arnold transform, and fig. 4(c) -4(f) are the four decrypted images obtained by the correct index key, respectively, and the decrypted images can be effectively identified visually.
The encryption/decryption effect and security of the present invention will be described below by taking decryption of "Lena" image as an example.
Fig. 5(a) shows the variation relationship between the correlation coefficient between the decrypted image and the plaintext image and the noise intensity added by the ciphertext, and it can be seen that the minimum value of the correlation coefficient is greater than 0.4, which indicates that the invention has good anti-noise capability. Fig. 5(b) shows a variation relationship between the correlation coefficient between the original image "Lena" and the corresponding decrypted image and the corresponding ciphertext amount, and when the ciphertext amount is present, the corresponding CC value exceeds 0.5, which indicates that the plaintext image can be effectively recovered by the present invention when the ciphertext amount is relatively small.
The security of the invention is examined below. A pass security test is first performed to verify the security of the measurement matrix, scrambling key and symbol key against errors. The invention uses a controlled variable method, namely only one variable is changed, and the other variables are kept unchanged. When the ghost imaging encryption result is decrypted using the wrong measurement matrix, the resulting decryption result is shown in fig. 6 (a); when decryption is performed using the wrong Arnold transformation key, i.e., the wrong number of Arnold transformations, the obtained decryption result is shown in FIG. 6 (b); when the wrong symbol key is used, the resulting decryption result is shown in fig. 6 (c). The above analysis and experiment results show that the measurement matrix, the scrambling key and the symbol key are three essential elements for realizing image decryption, and when one of the three essential elements has an error, a correct decryption result cannot be obtained.
In conclusion, the invention combines the image Walsh-Hadamard compression transform and the principle of calculating ghost imaging coding, and encrypts to generate an intensity sequence as a ciphertext sequence, so that a large number of keys do not need to be transmitted, and the problem of key template information leakage existing in most image encryption methods is solved; the encryption process and the decryption process respectively adopt the ghost image calculation coding and decoding modes, so that optical holographic recording of phases is not needed, the process is simpler, and simultaneously Arnold transformation is introduced in the operation process and combined with a ciphertext sequence, so that the safety of the system is improved.
Claims (7)
1. A multi-image encryption and decryption method based on Walsh transform and computational ghost imaging is characterized in that: comprises the following steps of encryption:
s1, performing Walsh-Hadamard transform on the multiple images to obtain compressed sparse images, extracting partial pixels in energy sets in all the sparse images to form pixel sets, and recombining the pixel sets according to a zigzag index sequence to obtain a recombined image;
s2, performing sign taking operation on the reconstructed image to obtain a sign matrix containing each pixel, performing constant decomposition on the sign matrix to obtain a group of amplitude plate pairs, and performing Fresnel diffraction on the amplitude plate pairs to generate object plane light intensity;
s3, carrying out absolute value taking operation on the reconstructed image to obtain a matrix containing the absolute value of each pixel, and carrying out Arnold scrambling transformation on the absolute value matrix once to obtain a target image;
s4, taking the target image as an input image of the ghost imaging system, projecting the target image by utilizing the light intensity of the object plane to obtain intensity pairs, calculating the difference value between the intensity pairs to obtain an intensity value, combining all the intensity values to form a ciphertext sequence, and finishing encryption;
and (3) decryption:
rearranging the light intensity of the object plane into corresponding row vector pairs, calculating the difference value between the row vector pairs to obtain row vectors, sequentially arranging the row vectors from top to bottom according to the sequence numbers to form a measurement matrix, executing a compressed sensing reconstruction algorithm with the ciphertext sequence to recover the target image, and finally restoring the image according to the zigzag pixel index sequence by using inverse Arnold transformation to finish decryption.
2. The walsh transform and computational ghost imaging based multiple image encryption and decryption method of claim 1, wherein: the formula obtained for the pair of amplitude plates in step S2 is as follows:
in the formula: pW +And PW -Two amplitude plate pairs consisting of 0 and 1 respectively;IWHT[]representing inverse Walsh-Hadamard transforms, (m, n), (x)0,y0) Respectively representing spatial coordinates, delta, before and after the inverse Walsh-Hadamard transformW(m, n) is a two-dimensional impulse function,
3. the walsh transform and computational ghost imaging based multiple image encryption and decryption method of claim 2, wherein: the generation process of the object plane light intensity is as follows: irradiating the amplitude plates P with parallel light of wavelength lambdaWi +,PWi -A distance z in the propagation direction1The diffracted light field at (A) is represented as the primary wavelength of the amplitude plate at λ and the distance at z1The recorded diffraction light intensity is the object plane light intensity:
wherein FrT [ alpha ]]Representing the Fresnel transformation, (x, y) representing the coordinates of the Fresnel diffraction output plane, | luminance2Indicating the operation of recording the diffracted intensity.
4. The walsh transform and computational ghost imaging based multiple image encryption and decryption method of claim 1, wherein: the process of obtaining the target image by performing Arnold scrambling transformation on the absolute value matrix is shown as the following formula:
where a, b and N are positive integers, a, b and the number of Arnold transformations as decryption keys, N represents the width of the new matrix, mod () is a modulo operation, (x)n,yn) Is the pixel coordinate of the new matrix, (x'n,y′n) Is (x)n,yn) The coordinates of the object after the transformation are obtained,is an invertible matrix.
5. The walsh transform and computational ghost imaging based multiple image encryption and decryption method of claim 1, wherein: in step S4, intensity pair D is measured and recorded using a barrel probeWi +And DWi -I.e. by
DWi +=SUM[IWi +(x,y)T(x,y)]
DWi -=SUM[IWi -(x,y)T(x,y)];
Wherein SUM () represents a SUM operation on all elements of the matrix; t (x, y) is the target image, and (x, y) represents the coordinates of the Fresnel diffraction output plane;
calculating DWi +、DWi -The difference between them is used to obtain an intensity value DWiNamely:
DWi=DWi +-DWi -
DWito compute the ith ciphertext of the ghost image, all the ciphertexts are combined to form a ciphertext sequence.
6. The walsh transform and computational ghost imaging based multiple image encryption and decryption method of claim 1, wherein: the process of recovering the target image in the decryption step is as follows:
7. The walsh transform and computational ghost imaging based multiple image encryption and decryption method of claim 1, wherein: the decryption step uses the inverse Arnold transform as follows:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110230376.1A CN112989371B (en) | 2021-03-02 | 2021-03-02 | Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110230376.1A CN112989371B (en) | 2021-03-02 | 2021-03-02 | Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112989371A true CN112989371A (en) | 2021-06-18 |
CN112989371B CN112989371B (en) | 2022-10-18 |
Family
ID=76352010
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110230376.1A Active CN112989371B (en) | 2021-03-02 | 2021-03-02 | Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112989371B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114979407A (en) * | 2022-05-24 | 2022-08-30 | 浙江科技学院 | Multi-image encryption and decryption method based on code division multiple access and deep learning ghost imaging |
CN116743934A (en) * | 2023-05-29 | 2023-09-12 | 上海理工大学 | Equal resolution image hiding and encrypting method based on deep learning and ghost imaging |
RU2817397C1 (en) * | 2023-08-01 | 2024-04-16 | федеральное государственное автономное образовательное учреждение высшего образования "Национальный исследовательский университет ИТМО" (Университет ИТМО) | Method of decrypting encrypted images |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107564074A (en) * | 2017-09-12 | 2018-01-09 | 山东大学 | Optical image encryption method based on the imaging of row multiplexed compressed ghost with XOR |
CN108804934A (en) * | 2018-05-30 | 2018-11-13 | 西安理工大学 | The more resume images of optics based on two cascade free-space propagation transformation |
CN110348232A (en) * | 2019-06-21 | 2019-10-18 | 西安理工大学 | Use the optical image encryption method of the calculating ghost imaging of phase iterative algorithm |
CN110351451A (en) * | 2019-06-28 | 2019-10-18 | 西安理工大学 | A kind of information ciphering method based on the imaging of calculating ghost and customization data capsule |
-
2021
- 2021-03-02 CN CN202110230376.1A patent/CN112989371B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107564074A (en) * | 2017-09-12 | 2018-01-09 | 山东大学 | Optical image encryption method based on the imaging of row multiplexed compressed ghost with XOR |
CN108804934A (en) * | 2018-05-30 | 2018-11-13 | 西安理工大学 | The more resume images of optics based on two cascade free-space propagation transformation |
CN110348232A (en) * | 2019-06-21 | 2019-10-18 | 西安理工大学 | Use the optical image encryption method of the calculating ghost imaging of phase iterative algorithm |
CN110351451A (en) * | 2019-06-28 | 2019-10-18 | 西安理工大学 | A kind of information ciphering method based on the imaging of calculating ghost and customization data capsule |
Non-Patent Citations (5)
Title |
---|
GANG QU ET.AL: "Optical color image encryption based on Hadamard single-pixel imaging and Arnold transformation", 《OPTICS AND LASERS IN ENGINEERING》 * |
SUI LIANSHENG ET.AL.: "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval", 《LASER PHYSICS LETTERS》 * |
TIAN’AO LU ET.AL.: "Comprehensive comparison of single-pixel imaging methods", 《OPITCS AND LASERS IN ENGINEERING》 * |
XIAO YUAN ET.AL.: "Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing", 《APPLIED PHYSICS B》 * |
魏积愚等: "基于FWHT的动态多混沌彩色图像加密算法", 《微电子学与计算机》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114979407A (en) * | 2022-05-24 | 2022-08-30 | 浙江科技学院 | Multi-image encryption and decryption method based on code division multiple access and deep learning ghost imaging |
CN114979407B (en) * | 2022-05-24 | 2023-08-22 | 浙江科技学院 | Multi-image encryption and decryption method based on code division multiple access and deep learning ghost imaging |
CN116743934A (en) * | 2023-05-29 | 2023-09-12 | 上海理工大学 | Equal resolution image hiding and encrypting method based on deep learning and ghost imaging |
CN116743934B (en) * | 2023-05-29 | 2024-05-14 | 上海理工大学 | Equal resolution image hiding and encrypting method based on deep learning and ghost imaging |
RU2817397C1 (en) * | 2023-08-01 | 2024-04-16 | федеральное государственное автономное образовательное учреждение высшего образования "Национальный исследовательский университет ИТМО" (Университет ИТМО) | Method of decrypting encrypted images |
Also Published As
Publication number | Publication date |
---|---|
CN112989371B (en) | 2022-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme | |
Wang et al. | Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform | |
CN112637441B (en) | Color image compression encryption method based on compressed sensing | |
CN112989371B (en) | Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging | |
CN110139000B (en) | Image compression encryption method based on compressed sensing and life game scrambling | |
CN103117847B (en) | A kind of optical encryption method holographic based on chaos and calculating | |
CN111241554A (en) | Digital image encryption and decryption system based on visual password | |
CN110519037B (en) | Image encryption method of hyperchaotic pseudorandom sequence | |
CN108111710B (en) | Multi-image encryption method capable of reducing data volume of ciphertext and key | |
Wu et al. | Correlated-imaging-based chosen plaintext attack on general cryptosystems composed of linear canonical transforms and phase encodings | |
Wen et al. | High-quality color image compression-encryption using chaos and block permutation | |
CN113486365A (en) | Color image optical encryption method | |
Qu et al. | Optical color watermarking based on single-pixel imaging and singular value decomposition in invariant wavelet domain | |
Yuan et al. | Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation | |
CN114119417A (en) | Image processing method, system and storage medium | |
CN107563179B (en) | Image authentication method based on line multiplexing compression ghost imaging and hyperplane key sharing | |
CN114119785A (en) | Color ghost steganography method based on multi-discriminator confrontation generation network | |
Zhu et al. | Optical color ghost cryptography and steganography based on multi-discriminator generative adversarial network | |
Wang et al. | Multi-image encryption based on QR code and singular value decomposition ghost imaging | |
CN112765623B (en) | Optical multi-image authentication and encryption method based on phase recovery algorithm | |
Swathika et al. | Image encryption and decryption using chaotic system | |
Wan et al. | Compressed optical image encryption in the diffractive-imaging-based scheme by input plane and output plane random sampling | |
Li | Hybrid color and grayscale images encryption scheme based on quaternion hartley transform and logistic map in gyrator domain | |
CN114119786A (en) | Dense Net-based pseudo ghost imaging encryption and decryption method | |
Fan et al. | Image compression and encryption algorithm with wavelet-transform-based 2D compressive sensing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |